Database Enviroment

THE DATABASE ENVIRONMENT:A database defines a structure for storing information and it collects information that is organized in such a way that a computer program can quickly select desired pieces of data. A database can also be thought of as an electronic filing system. Data and information are extracted from a database by creating a query and then submitting it to the query database management system (DBMS) and it is posed in a language that only the DBMS can understand.

PROBLEMS AND CONSTRAINTS:The museum’s current system is efficient but there seems to be some problems with the rights and privileges to the current users. For example, all users currently have the rights to input registration dates for certain events. The current system in not tracking the dates therefor there is no log of how many people are attending or the dates that they are supposed to attend. There seems to be lost inventory because the inventory does not match the reports that are generated. Some other problems that may exist is if artwork is removed and it is not enter into the database location it will not be updated. The reports also take too long to generate and scan the inventory. This requires the help of a user who has better access to the system rights. The administrator will have the rights to go in, access information and change and fix issues that occur. The basic employees will have limited rights to access certain information such as certain artist and artwork in the museum as well as dates that the artist will be in the museum. There is also a need for an explicit backup and recovery implementation. The administrator also needs to track openings for new artwork in the museum.

SecurityThe administrative support can use the systems database along with other authorized personal as long as he or she has a username and a password to access it. The system is password protected and is a secure system. Security is a plus when using a database...

You May Also Find These Documents Helpful

...﻿
What is Reliability and integrity for database?
Alvin W. Demore II
University of Maryland University College
Abstract
In this document we will be learning what reliability and integrity to databases and how company’s uses this technique to make sure that their company is strong and safe. Reliability plays a big part in databases because you need to make sure that everything can work without failing or crashing the system. The next big part is integrity because if you don’t have security in the databases then anyone can look at your company records or worst cases scenario a hacker can take all company money and they won’t even know. So this is why these two techniques go hand to hand and why every company that has a database always uses reliability and integrity.Introduction
Reliability and integrity are very important when using databases it is also important that the databases security is good too. This when reliability and integrity comes in to play; reliability is the measure of the success with the system conforms to some authoritative specification of its behavior. When behavior deviates from that when specified is then called a failure. Now integrity when the database as a whole is protected against damage, as from the failure of a disk drive or the corruption of the master database index. Another sign of integrity is...

...﻿1
Determining Databases And Data Communications
Jeremy Pope
BIS/320
September 08, 2014
Carl Wise
1
In general when determining the types of databases and data communication systems to employ companies need to consider the nature of their business, the needs of the employees/clients, volume/types of shipments, employee schedules, shipping company, shipping company costs, equipment, equipment components, shipping schedule, shipment/equipment damage or loss, etc. The list of implementations required in a system can go on and on. In this paper we are going to determine what database and/or database communication systems will be the most efficient to employ as a marketing assistant for a consumer electronics company in charge of setting up the companies trade show.
As a marketing assistant in charge of setting up my companies trade show booth the first thing I would do, after determining what equipment and displays are to be used in the trade show, is set up a departmental color coded/ employee ID number label tracking system comprised of a combination of the manufacturer serial numbers, model numbers from each piece of equipment along with a detailed description of each piece including cost. I would create a department identification number that will identify the department to which each item must be returned. I would personally...

...5.1: DEFINITION OF DATABASE
A database is a shared collection of interrelated data designed to meet the varied information needs an organization. A database has two important properties that it is integrated that it is shared.
5.2: IMPORTANCE OF DATABASE
The data resources of organization and its management are very important. The recognition by management that data or information is indeed a resource is a recent development. Information, which in essence is analysis and synthesis of data, will unquestionably be one of the most vital of corporate resources. It will be structured into models for planning and decision-making. It will integrate into product design and marketing methods. In other words information will be recognized and treated as an assets.
By integrated mean that previously distinct data files have been logically organized to eliminate redundancy and the facilitate data access. By shared mean that all authorized users in the organization have access to the same data to use for variety of other activities.
5.3: BENEFITS OF THE DATABASE APPROACH
The database approach offers number of important advantages.
5.3.1 : Minimal Data Redundancy
There is not as much storing of multiple copies of the data as in manual system. It is designed into the system improve performance and the system is aware of the redundancy.
5.3.2: Consistency of Data
By...

...Database Vulnerabilities
I. Introduction
Computer crime has been defined as, "Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data."
The purpose of this work is to examine breaches in computer security. As a future IT professional, with the possibility of being in charge of protecting the security of a database, it is relevant to take a "hacker approach" to security. Effective security is no matter where one goes fundamentally the same. Successful fundamental security practices are universal, crossing all arenas of computer usage whether it is in the nonprofit sector, government, or for personal use. Times change, technology moves forward, cultures vary from place yet there is no magic bullet that will protect ones system from every possible hack. The road to effective security can take many different paths, not one right path. Organizations with different missions, different hardware and different software remain secure not because of a particular version of a firewall or practices is superior, but because they use a strategy involving a defense in depth and are prepared for an ever changing computer attack. Any business or individual that uses the Internet is attaching its computer system to an immense network. This exposes hard drives to intruders and...

...BCO 1102 Information Systems for Business
Database Assignment
Sunway- Kuala Lumpar
Semester 1, 2011
The database assignment is divided into two major sections. The first requires you to develop a database in Access 2007. Imagine that this is a prototype that will have four tables and some basic features such as forms, reports and queries. The second part is documentation that is used to describe the database you have produced to the client who has requested the database. In this latter Microsoft Word 2007 document you will have a covering letter to the client and then approximately two or three pages of technical documentation that describes the basic features of the system you produced.
Case Study
Products Table |
Product
Code | Description | Price |
STA | Standard Kool Air Conditioner | $ 199.00 |
SUA | Super Kool Air Conditioner | $ 259.00 |
RAC | Really Kool Air Conditioner | $ 325.00 |
MAC | Basic Model Air Conditioner | $ 159.00 |
EAC | Executive Model Air Conditioner | $ 439.00 |
PAC | Lightweight Portable Model | $ 309.00 |
Imagine that you are a developer of small PC applications in products such as Microsoft Excel and Access. You have been approached by a business called Qwik Kool who manufacture air conditioning systems. Quik Kool only manufacture air-conditioning systems and all sales to retail customers are made through...

...﻿A hypermedia database is a computer retrieval system. The database allows the user to access texts, video and audio recordings and photographs. Files are stored according to subject.
Hypermedia Database
Hypermedia database comprises a set of interconnected multimedia web pages. In this type of database, information is stored online and the data can be accessed by several users at a time.
Hypermedia, an extension of the term hypertext, is a nonlinear medium of information which includes graphics, audio, video, plain text and hyperlinks. This contrasts with the broader term multimedia, which may include non-interactive linear presentations as well as hypermedia. It is also related to the field of electronic literature. The term was first used in a 1965 article by Ted Nelson.
The World Wide Web is a classic example of hypermedia, whereas a non-interactive cinema presentation is an example of standard multimedia due to the absence of hyperlinks.
The first hypermedia work was, arguably, the Aspen Movie Map. Bill Atkinson's HyperCard popularized hypermedia writing, while a variety of literary hypertext and hypertext works, fiction and nonfiction, demonstrated the promise of links. Most modern hypermedia is delivered via electronic pages from a variety of systems including media players, web browsers, and stand-alone applications (i. e., software that does not require network access). Audio...

...ITM540 – Database and Knowledge-base Management
Module 3
Case Assignment 3
Robert T. Goodwin
Database Applications
In his book Groupware -- Computer Support for Business Teams, Robert Johansen defines groupware as "specialized computer aids that are designed for the use of collaborative work groups." This definition is better than the "shared data" definition because it helps eliminate multiuser databases from the groupware category. Yet electronic mail fits this definition, as well as some other software sharing tools that experts are still debating.
A more useful definition also appears to be one of the oldest. Peter and Trudy Johnson-Lenz are credited by many as coining the term groupware in 1978. They defined it as "intentional group processes plus software to support them."
Groupware enhances collaboration by allowing by the exchange of ideas electronically. All the messages on a topic can be saved in a group, stamped with the data, time, and author. Any group member can review the ideas of others at any time and add to them, or individuals can post a documents for others to comment upon or edit. Members can posts requests for help, allowing others to responds. finally, if a group so chooses, members can store their-work notes on the groupware so that all others in the group can see what programs is being made, what problems occur, and what...

...﻿
Determining databases and Data Communications
Bis/320
September 23, 2013
Dr. Julie Ruse
Determining databases and Data Communications
Electronic Company
To determine ways of managing a trade show booth the individual shall keep certain things in mind about the components, equipment, shippers, shipment, and time to assemble the pertinent equipment for display. Not only setting up the pertinent equipment for display but also need to make selection on setup team, and supervised the trade show personnel. After the show, the individual have to accountable for the equipment, and reconcile to transport back to the main office for the organization to check the components or equipment back into the warehouse. The individual need to make sure there will be no losses or damages on the equipment before check it back into the warehouse.
The individual or supervisor are in charge of setting up a consumer electronics trade shown, which mainly consists of products like laptops, cell phones, LCDs monitors, batteries as well as computer and phone accessories. The supervisor needs to make sure that these products are safely return to the organization after the completion of the trade show. There several ways in which the supervisor can categorize these equipment or products into their respective fields. Therefore, the supervisor can keep a track of the merchandise during the shipment to the main office, and the supervisor will become...